Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-8725

Опубликовано: 04 янв. 2016
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.3
CVSS3: 5.5

Описание

The dissect_diameter_base_framed_ipv6_prefix function in epan/dissectors/packet-diameter.c in the DIAMETER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the IPv6 prefix length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.

РелизСтатусПримечание
artful

ignored

end of life
bionic

released

2.6.3-1~ubuntu18.04.1
devel

not-affected

2.6.3-1
esm-apps/bionic

released

2.6.3-1~ubuntu18.04.1
esm-apps/xenial

released

2.6.3-1~ubuntu16.04.1
esm-infra-legacy/trusty

released

2.6.3-1~ubuntu14.04.1
precise

ignored

end of life
precise/esm

DNE

precise was needed
trusty

released

2.6.3-1~ubuntu14.04.1
trusty/esm

released

2.6.3-1~ubuntu14.04.1

Показывать по

EPSS

Процентиль: 72%
0.00737
Низкий

4.3 Medium

CVSS2

5.5 Medium

CVSS3

Связанные уязвимости

redhat
около 10 лет назад

The dissect_diameter_base_framed_ipv6_prefix function in epan/dissectors/packet-diameter.c in the DIAMETER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the IPv6 prefix length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.

CVSS3: 5.5
nvd
около 10 лет назад

The dissect_diameter_base_framed_ipv6_prefix function in epan/dissectors/packet-diameter.c in the DIAMETER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the IPv6 prefix length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.

CVSS3: 5.5
debian
около 10 лет назад

The dissect_diameter_base_framed_ipv6_prefix function in epan/dissecto ...

CVSS3: 5.5
github
больше 3 лет назад

The dissect_diameter_base_framed_ipv6_prefix function in epan/dissectors/packet-diameter.c in the DIAMETER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the IPv6 prefix length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.

suse-cvrf
около 10 лет назад

Security update for wireshark

EPSS

Процентиль: 72%
0.00737
Низкий

4.3 Medium

CVSS2

5.5 Medium

CVSS3